Security Statement

Before operating the device, read this section carefully to prevent network security incidents.

Password Setting

For security, the passwords you set shall meet the following requirements:

Cryptographic Algorithm

Cryptographic algorithms include AES, RSA, HMAC, and SHA2. Comply with the following suggestions to select an algorithm based on the scenario. Otherwise, your security defense requirements may fail to be met.

As for the same algorithm, you are advised to use keys of a higher intensity.

Feature Conventions

The following features may involve the collection of users' communication contents. Huawei alone is unable to collect or save the content of users' communications. You are advised to enable the related functions based on the applicable laws and regulations in terms of purpose and scope of usage. In usage, you are obligated to take considerable measures to ensure that the content of users' communications is fully protected when the content is being used and stored.

Privacy Statement

This product is a network attack detection and defense system. During attack traffic analysis, it provides the function of capturing packets for analysis, which extracts attack signatures and facilitates attack defense. This function, however, may involve users' raw communication data.

To provide customers with traffic detection and attack traffic scrubbing services, this product sends email or SMS messages to customers for notification. Therefore, customers shall fill in relevant contact information. If customers do not want to receive these notifications, they can also skip this process.

This product protects privacy with the following measures:

  1. Contact information stored on this product is for the sending of attack alarm notifications or reports only but not of irrelevant information and is not for other purposes.
  2. This product captures packets only after the administrator customizes packet capture tasks instead of automatically.
  3. By default, this product captures only packet headers. To capture more of the packets, the administrator must manually adjust the setting.
  4. The default sampling ratio for packet capture is 1024:1 (that is, 1 packet is captured from every 1024 packets for analysis), and the maximum sampling ratio is 128:1. User communication data (voice, SMS, and email) cannot be restored in batches through captured packets.
  5. This product stores captured packets as files and automatically deletes the files after a specified period of time, which is 3 months by default and 12 months at most.
  6. This product provides the packet capture function for attack evidence collection and attack fingerprint extraction to alleviate attacks. This function does not process or analyze packet content.
  7. The anti-DDoS device captures packets and sends packet capture files to the ATIC. The ATIC will in no way send the files to a third-party system.

You shall comply with applicable laws and regulations and take proper measures to secure personal data, such as properly allocating administrator permissions, and properly configuring packet capture rules, tasks, and file storage time.

Certificate Usage

Network Deployment

Software Installation and Upgrade

To ensure the integrity of the obtained software, use the OpenPGP to verify the software digital signature. Obtain the OpenPGP as follows:

Download it from http://support.huawei.com/enterprise:

  1. Access http://support.huawei.com/enterprise.
  2. Click Tools, search for OpenPGP, and use it for verification.

Download it from http://support.huawei.com:

  1. Access http://support.huawei.com/carrier/digitalSignatureAction.
  2. Click Download, download OpenPGP Signature Verification Guide, and decompress the downloaded package.
  3. Further decompress the VerificationTools.zip package.
  4. Access the decompressed VerificationTools folder and obtain the verification tool to perform verification.

Third-Party Software

The ATIC system uses the following third-party software programs:

Operation and Maintenance

Before maintenance operations, such as transferring troubleshooting-related data out of customer networks, technical engineers must get written authorization from customers. Operations beyond authorization are prohibited.

Back up before and exercise caution when you modify or delete files, logs, and configurations in the system.

Public IP Address Usage Declaration

For purposes of introducing features and giving configuration examples, the MAC addresses and public IP addresses of real devices are used in the product documentation. Unless otherwise specified, these addressees are used as examples only.


Copyright © Huawei Technologies Co., Ltd.